A. 0
B. 1
C. 10
D. 20
您可能感興趣的試卷
你可能感興趣的試題
Refer to the exhibit. Which statement is true about the 6.6.6.0/24 prefix?()
A.If another path advertises the 6.6.6.0/24 path and has the default local preference, that path is more preferred
B.The command neighbor send-community is configured on BGP neighbor 10.10.23.3
C.The route 10.10.23.3 is not being advertised to other BGP neighbors
D.Route 6.6.6.0/24 is learned by an IBGP peer
A.0
B.1
C.10
D.200
A.0
B.1
C.10
D.20
A. probe request/response, authentication request/response, association request/response
B. association request/response, authentication request/response, probe request/response
C. probe request/response, association request/response, authentication request/response
D. association request/response, probe request/response, authentication request/response
Refer to the exhibit. The command spanning-tree guard root is configured on interface Gi0/0 on both switch S2 and S5. The global configuration command spanning-tree uplinkfast has been configured on both switch S2 and S5. The link between switch S4 and S5 fails. Will Host A be able to reach Host B?()
A. Yes. Traffic can pass either from switch S6 to S3 to S2 to S1, or, from switch S6 to S5 to S2 to S1.
B. No. Traffic will pass from switch S6 to S5 and dead-end at interface Gi 0/0.
C. No. Traffic will loop back and forth between switch S5 and S2.
D. Yes. Traffic will pass from switch S6 to S3 to S2 to S1.
E. No. Traffic will either pass from switch S6 to S5 and dead-end, or traffic will pass from switch S6 to S3 to S2 and dead-end.
A. The Aironet Desktop Utility (ADU) can be used to establish the association between the client adapter and the access point, manage authentication to the wireless network, and enable data encryption.
B. The Aironet Desktop Utility (ADU) and the Microsoft Wireless Configuration Manager can be used at the same time to configure the wireless client adapter.
C. The Aironet Desktop Utility (ADU) can support only one wireless client adapter installed and used at a time.
D. The Aironet Desktop Utility (ADU) profile manager feature can create and manage only one profile for the wireless client adapter.
E. When the user selects a different profile in the Aironet Desktop Utility (ADU), the settings for the wireless client adapter are changed only after a reboot.
Refer to the exhibit. The command spanning-tree guard root is configured on interface Gi0/0 on both switch S2 and S5. The global configuration command spanning-tree uplinkfast has been configured on both switch S2 and S5. The link between switch S4 and S5 fails. Will Host A be able to reach Host B?()
A.Yes. Traffic can pass either from switch S6 to S3 to S2 to S1, or, from switch S6 to S5 to S2 to S1
B.No. Traffic will pass from switch S6 to S5 and dead-end at interface Gi 0/0
C.No. Traffic will loop back and forth between switch S5 and S2
D.Yes. Traffic will pass from switch S6 to S3 to S2 to S1
E.No. Traffic will either pass from switch S6 to S5 and dead-end, or traffic will pass from switch S6 to S3 to S2 and dead-end
Refer to the exhibit. A Cisco Aironet Wireless LAN Client Adapter has been installed and configured through the ADU on the PC. The Aironet System Tray Utility (ASTU) has been enabled during the installation and the icon appears in the system tray area in the lower right of the desktop. What is the significance of the icon?()
A. It indicates that the radio of the client adapter is disabled.
B. It indicates that the client adapter is not associated to an access point or another client.
C. It indicates that the client adapter is associated to an access point or another client, but the user is not EAP authenticated.
D. It indicates that the client adapter is associated to an access point or another client, that the user is authenticated if the client adapter is configured for EAP authentication, and that the signal strength is excellent or good.
E. It indicates that the client adapter is associated to an access point or another client, that the user is authenticated if the client adapter is configured for EAP authentication, and that the signal strength is fair.
F. It indicates that the client adapter is associated to an access point or another client, that the user is authenticated if the client adapter is configured for EAP authentication, and that the signal strength is poor.
Refer to the exhibit. EIGRP has been configured on all routers in the network. What additional configuration statement should be included on router R4 to advertise a default route to its neighbors?()
A.R4(config)# ip default-network 10.0.0.0
B.R4(config)# ip route 0.0.0.0 0.0.0.0 10.1.1.1
C.R4(config)# ip route 10.0.0.0 255.0.0.0 10.1.1.1
D.R4(config-router)# default-information originate
Refer to the exhibit. Which three statements accurately describe this GLBP topology? (Choose three.)()
A. Router A is responsible for answering ARP requests sent to the virtual IP address.
B. If Router A becomes unavailable, Router B will forward packets sent to the virtual MAC address of Router A
C. If another router were added to this GLBP group, there would be two backup AVGs
D. Router B is in GLBP listen state.
E. Router A alternately responds to ARP requests with different virtual MAC addresses.
F. Router B will transition from blocking state to forwarding state when it becomes the AVG
最新試題
Which two statements about voice VLANs are correct?()
Refer to the exhibit. Which Virtual Router Redundancy Protocol (VRRP) statement is true about the roles of the master virtual router and the backup virtual router?()
Refer to the exhibit. Which three statements accurately describe this GLBP topology?()
Refer to the exhibit. Which three statements accurately describe this GLBP topology? (Choose three.)()
Refer to the exhibit. Which three statements are true about trust boundaries in the campus network? (Choose three.)()
What are two rules for compacting IPv6 addresses?()
Refer to the exhibit. Which statement is true?()
Which statement about the Lightweight Access Point Protocol (LWAPP) protocol is true?()
Which issue or set of issues does the Lightweight Access Point Protocol (LWAPP) address?()
Refer to the exhibit. Which statement is true about where trust boundaries should be established in a network?()